General

  • Target

    2025-03-06_896fbf3838f3cc71e9b651fdb46ddb06_ryuk

  • Size

    2.8MB

  • Sample

    250306-xkskyawjx3

  • MD5

    896fbf3838f3cc71e9b651fdb46ddb06

  • SHA1

    081d630502e820ab5c3489b21bfc8242790c4537

  • SHA256

    8390df4f8dc9430a5896eadd1edf330bec8867f4abdfa7f619eb3c994699bbd8

  • SHA512

    2dba44cc797b147ec8f188d7626734f61f34abbfe4d5476c13c8277cc39f631511eee35b2f154de2180d58c2e9492a383c0a4f59d3de3a3fbc1cab372bef6762

  • SSDEEP

    49152:1ypXywS6mCa507NUUWn043oHS3fLYwVq1/xT3DDbw0TUqyKxP78:TChSDYw8yixPw

Malware Config

Targets

    • Target

      2025-03-06_896fbf3838f3cc71e9b651fdb46ddb06_ryuk

    • Size

      2.8MB

    • MD5

      896fbf3838f3cc71e9b651fdb46ddb06

    • SHA1

      081d630502e820ab5c3489b21bfc8242790c4537

    • SHA256

      8390df4f8dc9430a5896eadd1edf330bec8867f4abdfa7f619eb3c994699bbd8

    • SHA512

      2dba44cc797b147ec8f188d7626734f61f34abbfe4d5476c13c8277cc39f631511eee35b2f154de2180d58c2e9492a383c0a4f59d3de3a3fbc1cab372bef6762

    • SSDEEP

      49152:1ypXywS6mCa507NUUWn043oHS3fLYwVq1/xT3DDbw0TUqyKxP78:TChSDYw8yixPw

    • Azov

      A wiper seeking only damage, first seen in 2022.

    • Azov family

    • Renames multiple (8204) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks